Skip to main content

Exploiting Social Interactions in Mobile Systems

  • Conference paper
UbiComp 2007: Ubiquitous Computing (UbiComp 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4717))

Included in the following conference series:

Abstract

The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic of this new environment – user mobility. In addition to mobility, another defining characteristic of mobile systems is user social interaction. This paper investigates how mobile systems could exploit people’s social interactions to improve these systems’ performance and query hit rate. For this, we build a trace-driven simulator that enables us to re-create the behavior of mobile systems in a social environment. We use our simulator to study three diverse mobile systems: DTN routing protocols, firewalls preventing a worm infection, and a mobile P2P file-sharing system. In each of these three cases, we find that mobile systems can benefit substantially from exploiting social information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adar, E., Huberman, B.: Free riding on Gnutella. First Monday 5(10) (October 2000)

    Google Scholar 

  2. Albert, R., Barabasi, A.-L.: Statistical mechanics of complex networks. Reviews of Modern Physics 74(1), 47–97 (2002)

    Article  Google Scholar 

  3. Barabasi, A.-L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509–512 (1999)

    Article  Google Scholar 

  4. CNET News.com. Mobile browsing becomes mainstream  (2006), http://news.com.com/Mobile+browsing+becoming+mainstream/2100-1039_3-6062365.html

  5. Cole, R.G.: Initial Studies on Worm Propagation in MANETS for Future Army Combat Systems (2004), http://stinet.dtic.mil/

  6. Cole, R.G., Phamdo, N., Rajab, M.A., Terzis, A.: Requirements of Worm Mitigation Technologies in MANETS. In: Principles of Advanced and Distribution Simulation (2005)

    Google Scholar 

  7. ComputerWorld. Cabir Worm Wriggles into U.S. Mobile Phones (2005), http://www.computerworld.com/securitytopics/security/virus/story/0,10801,99935,00.html

  8. Ebel, H., Davidsen, J., Bornholdt, S.: Dynamics of social networks. Complexity 8(2), 24–27 (2002)

    Article  Google Scholar 

  9. Granovetter, M.S.: The strength of weak ties. The American Journal of Sociology 78(6), 1360–1380 (1973)

    Article  Google Scholar 

  10. Gummadi, K.P., Dunn, R.J., Saroiu, S., Gribble, S.D., Levy, H.M., Zahorjan, J.: Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In: 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, USA, October 2003, ACM Press, New York (2003)

    Google Scholar 

  11. Holme, P., Kim, B.J.: Growing scale-free networks with tunable clustering. Physical Review E 65(026107), 1–4 (2002)

    Google Scholar 

  12. InfoSyncWorld. First Symbian OS Virus to Replicate over MMS Appears (2005), http://www.infosyncworld.com/news/n/5835.html

  13. InfoWorld: More mobile Internet users than wired in Japan (July 2006), http://www.infoworld.com/article/06/07/05/HNjapannetusers_1.html

  14. Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network. In: Proceedings of ACM Sigcomm, Portland, OR, USA (2004)

    Google Scholar 

  15. Jin, E.M., Girvan, M., Newman, M.E.J.: The structure of growing social networks. Physical Review E 64(046132), 1–8 (2001)

    Google Scholar 

  16. Jones, E.P., Li, L., Ward, P.A.S.: Practical routing in delay-tolerant networks. In: Proc. of ACM Sigcomm Workshop on Delay-Tolerant Networking, Philadelphia, PA, USA (2005)

    Google Scholar 

  17. JuiceCaster. Share your mobile life with juicecaster (2007), http://www.juicecaster.com

  18. Kangourouge:Proxidating, the first ever Bluetooth dating software for mobile phones (2007), http://www.proxidating.com

  19. Lindgren, A., Doria, A., Shelen, O.: Probabilistic routing in intermittenly connected networks. In: Proceedings of ACM Mobihoc, Annapolis, MD, USA (2003)

    Google Scholar 

  20. Liogkas, N., Nelson, R., Kohler, E., Zhang, L.: Exploiting bittorrent for fun (but not profit). In: Proceedings of Proceedings of 5th International Workshop on Peer-to-Peer Systems (IPTPS), Santa Barbara, CA, USA (2006)

    Google Scholar 

  21. Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in bittorrent is cheap. In: Proceedings of HotNets, Irvine, CA, USA (2006)

    Google Scholar 

  22. Milgram, S.: The Familiar Stranger: An Aspect of Urban Anonymity. Addison-Wesley, Reading (1977)

    Google Scholar 

  23. MIT Media Lab: Reality Mining. http://reality.media.mit.edu/

  24. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The Spread of the Sapphire/Slammer Worm. Technical Report CAIDA, ICSI, Sillicon Defense, UC Berkeley EECS and UC San Diego (January 2003)

    Google Scholar 

  25. Moore, D., Shannon, C., Brown, J.: Code-red: a case study on the spread and victims of an internet worm. In: 2002 Internet Measurement Workshop (November 2002)

    Google Scholar 

  26. Niculescu, D., Nath, B.: Trajectory based forwarding and its applications. In: Proceedings of Mobicom, San Diego, CA, USA (2003)

    Google Scholar 

  27. Piatek, M., Isdal, T., Anderson, T., Krishnamurthy, A.: Do incentives build robustness in bittorrent. In: Proceedings of 4th Usenix Symposium on Networked Systems Design and Implementation (NSDI), Cambridge, MA, USA (2007)

    Google Scholar 

  28. Pogo. Pogo browser (2007), http://www.pogo42030.co.za

  29. Su, J., Chan, K.K.W., Miklas, A.G., Po, K., Akhavan, A., Saroiu, S., de Lara, E., Goel, A.: A preliminary investigation of worm infections in a bluetooth environment. In: 4th Workshop of Recurring Malcode (WORM), Fairfax, VA, USA (2006)

    Google Scholar 

  30. Su, J., Goel, A., de Lara, E.: An empirical evaluation of the student-net delay tolerant network. In: 3rd International Conference on Mobile and Ubiquitous Systems: Networks and Services (MOBIQUITOUS), San Jose, CA, USA (2006)

    Google Scholar 

  31. Vahdat, A., Becker, D.: Epidemic routing for partially-connected ad hoc networks. Technical Report CS-200006, Department of Computer Science, Duke University (April 2000)

    Google Scholar 

  32. Wang, Y., Jain, S., Martonosi, M., Fall, K.: Erasure-coding based routing for opportunistic networks. In: WDTN 2005: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, pp. 229–236. ACM Press, New York (2005)

    Chapter  Google Scholar 

  33. Watts, D.J., Strogatz, S.H.: Collective dynamics of ’small-world’ networks. Nature 393(6684), 440–442 (1998)

    Article  Google Scholar 

  34. Yan, G., Eidenbenz, S.: Bluetooth worms: Models, dynamics, and defense implications. In: 22nd Annual Computer Security Applications Conference, Miami Beach, FL, USA (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

John Krumm Gregory D. Abowd Aruna Seneviratne Thomas Strang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Miklas, A.G., Gollu, K.K., Chan, K.K.W., Saroiu, S., Gummadi, K.P., de Lara, E. (2007). Exploiting Social Interactions in Mobile Systems. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds) UbiComp 2007: Ubiquitous Computing. UbiComp 2007. Lecture Notes in Computer Science, vol 4717. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74853-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74853-3_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74852-6

  • Online ISBN: 978-3-540-74853-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics